Published online by Cambridge University Press: 31 January 2019
Our literature review consists of three parts. First, we consider the main juridical and academic definitions of cybercrime. Second, we briefly discuss the different bodies of literature on the cost, impact and harms of crime, as well as the related research design of measuring and assessing them. Third, we critically review the previous studies attempting to estimate the cost, impact and harms of cybercrime.
THE DEFINITIONS OF CYBERCRIME
As many other broad categories of crime, cybercrime too, is a contested concept. There is no consensus regarding the definition of cybercrime, either in the academic literature (e.g., Clough, 2015; Wall, 2007), or in legal and policy documents. As noted in a 2013 review of the UN Office on Drugs and Crime (UNODC, 2013), many of these documents do not even define cybercrime per se, but identify specific acts that constitute cybercrime. To confuse matters further, the terms “computer,” “e-,” “internet,” “digital” and “information crime,” are oft en used substitutes for cybercrime. Hence, for example, Clough (2015: 9) states that “there are almost as many terms to describe cybercrime as there are cybercrimes.” Along similar lines, Van der Hulst & Neve (2008, in Domenie, Leukfeldt, van Wilsem, Jansen & Stol, 2013: 2) conclude:
A common definition and conceptual framework is lacking for this field of crime. A veritable arsenal of terminology is used, sometimes in combination with the prefixes cyber, computer, e-, internet, digital or information. Terms are bandied around, applied randomly, reflect overlap in content or reflect important gaps.
For researchers, the lack of a clear definition is problematic. A shared definition would not only help delineate the scope of the problem under investigation, but also facilitate discussions among scholars and provide a basis for comparing their research findings (ENISA, 2016a: 82; Gordon & Ford, 2006: 13). This definitional cacophony at least partially reflects the fact that cybercrime is studied from a wide variety of disciplines, ranging from social sciences to computer sciences (Jaishankar, 2010). Computer scientists and security companies, for example, tend to use a rather technical lexicon unfamiliar to many conventional social scientists. In addition, these “technological” studies often emphasize specific techniques (e.g., malware or phishing) that can be deployed in order to commit several offences labelled as cybercrime in criminal law.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.